Secure Your Nest js API Endpoints with Auth0 in ~10 Minutes

Поділитися
Вставка
  • Опубліковано 8 вер 2024
  • Note: This video was originally uploaded on June 23, 2021.
    Don't let just anyone access your Nest.js API Endpoints. Learn how to protect them with Auth0 by validating access tokens in the form of JWT (JSON Web Tokens) on each request.
    Nest.js is a Node.js framework for building powerful server-side applications that feels very similar to Angular. In this video, learn how to secure your API endpoints in Nest.js with Auth0 by validating JWT access tokens.
    Nest.js Documentation - nestjs.com/
    Adding Nest.js Role-Based Access Control (pt. 2) - • Add RBAC to Your Nest....
    ___________________________________________
    Learn with Auth0 by Okta
    Try Auth0 for free - a0.to/yt-signup
    The Auth0 by Okta blog - a0.to/blog
    ___________________________________________
    Follow Us on Social
    Twitter - / oktadev
    LinkedIn - / oktadev

КОМЕНТАРІ • 10

  • @vijaykumar-mo8iv
    @vijaykumar-mo8iv 9 місяців тому +6

    Nice video. Please turnoff the background music, or reduce the background music volume

  • @MatheusRochaDev
    @MatheusRochaDev Рік тому

    very good tutorial, thanks for sharing!

  • @MelPurpleCrystal
    @MelPurpleCrystal 10 місяців тому +3

    How do the register and login work to get an access token in Nest? Both this video and another written tutorial in auth0 blog fail to provide this info for Nest.

    • @coldsir5406
      @coldsir5406 6 місяців тому +1

      Hi! Did you find the answer? I had the same question when watching this

    • @rishabhsethi29
      @rishabhsethi29 Місяць тому

      Since, Auth0 is a Oauth provider. Authorization should be done at Auth0.

  • @mouradouddah5934
    @mouradouddah5934 Рік тому

    goooood

  • @nikhilreddydev
    @nikhilreddydev Рік тому +1

    can anybody guide me on how do I implement strategy with passport-auth0?

  • @user-uh8gj1ke8n
    @user-uh8gj1ke8n 6 місяців тому

    Do not mix symmetric and asymmetric (ie HS256/RS256) algorithms: Mixing algorithms without further validation can potentially result in downgrade vulnerabilities.
    jwt({
    secret: "shhhhhhared-secret",
    algorithms: ["HS256"],
    //algorithms: ['RS256']
    });

  • @user-uh8gj1ke8n
    @user-uh8gj1ke8n 6 місяців тому

    Do not mix symmetric and asymmetric (ie HS256/RS256) algorithms: Mixing algorithms without further validation can potentially result in downgrade vulnerabilities.
    jwt({
    secret: "shhhhhhared-secret",
    algorithms: ["HS256"],
    //algorithms: ['RS256']
    });